Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Association Rule Extraction from XML Stream Data for Wireless Sensor Networks., , , and . Sensors, 14 (7): 12937-12957 (2014)Secure Group Communications over Combined Wired/Wireless Networks., , , and . IACR Cryptology ePrint Archive, (2004)On the security of a password-only authenticated three-party key exchange protocol., , , and . IACR Cryptology ePrint Archive, (2013)Digital Optoelectrical Pulse Method for Vernier-Type Rotary Encoders., , , and . IEEE Trans. Instrumentation and Measurement, 65 (2): 431-440 (2016)Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees., , , , , and . KES (1), volume 4692 of Lecture Notes in Computer Science, page 672-679. Springer, (2007)Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data., , , and . J. Inf. Sci. Eng., 30 (3): 787-817 (2014)Fast Extraction of Maximal Frequent Subtrees Using Bits Representation., , , and . J. Inf. Sci. Eng., 25 (2): 435-464 (2009)Security weakness in a three-party pairing-based protocol for password authenticated key exchange., , , and . Inf. Sci., 177 (6): 1364-1375 (2007)Web portal quality.. SOLI, page 163-168. IEEE, (2009)Influence of Information Product Quality on Informing Users: A Web Portal Context.. Informing Sci. Int. J. an Emerg. Transdiscipl., (2016)